I hereby claim:
- I am u039b on github.
- I am u039b (https://keybase.io/u039b) on keybase.
- I have a public key ASDpbfP1qrAqTFO8mm-Dn1gJVAX7Rj00tV8cwrYz-IB14go
To claim this, I am signing this object:
FROM ubuntu:20.04 | |
# Ref. https://github.com/mvt-project/mvt | |
# Fixing major OS dependencies | |
# ---------------------------- | |
RUN apt update \ | |
&& apt install -y python3 python3-pip libusb-1.0-0-dev \ | |
&& apt install -y wget \ | |
&& apt install -y adb \ |
# Android FinFisher 2019 obfuscated strings extraction from decompiled Java code using Procyon | |
# Esther Onfroy a.k.a U+039b - *@0x39b.fr (https://twitter.com/u039b) | |
# | |
# Parse Java source files of FinSpy weaponized APK | |
import javalang | |
import pystache | |
import glob | |
import sys | |
from javalang.tree import StatementExpression, MethodInvocation |
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
./adb shell service call iphonesubinfo 17 |awk -F "'" '{print $2}'|sed '1 d'|tr -d '.'|awk '{print}' ORS=|awk '{print "Phone number: "$1}' | |
./adb shell service call iphonesubinfo 1 |awk -F "'" '{print $2}'|sed '1 d'|tr -d '.'|awk '{print}' ORS=|awk '{print "IMEI: "$1}' |
#!/bin/bash | |
# Weekly Fail2Ban Report | |
# Be sure to sudo chmod +x script_name.sh to make it executable | |
# Original script from https://www.mopar4life.com/fail2ban-weekly-report-script/ | |
FAIL2BAN_PATH="/var/log/fail2ban*" | |
LOGFILE="/var/log/custom_fail2ban_report_$(date +%m%d%Y).log" | |
MAILTOADDRESS="your@domain.tld" | |
SUBJECT="$HOSTNAME Weekly Fail2Ban Report" |
import requests | |
import os | |
EXODUS_LOGIN_URI = '/api/get_auth_token/' | |
class Exodus: | |
""" | |
εxodus connector helps you to interact with it. | |
Usage: | |
>>> exodus = Exodus("http://localhost:8000", "/api/report/1/") |